Humans Are Bad at Risk Assessment, and Other Stories
Risk management is not one of humanity's strong points, but we can learn some lessons from our own real life experiences to apply
He is one of the co-founders of Threatpost and previously wrote for TechTarget and eWeek, when magazines were still a thing that existed. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. His work has appeared in The Boston Globe, The Improper Bostonian, Harvard Business School’s Working Knowledge, and most of his kids’ English papers.
Risk management is not one of humanity's strong points, but we can learn some lessons from our own real life experiences to apply
As software systems have become ever more complex, the opportunity for security researchers to show their value has grown, as
FIN7 is a highly active and capable cybercrime group also known as Carbanak that has been evolving and using its own tools such as
The new ZeroCleare malware has been used in destructive attacks against energy companies in the Middle East.
Many versions of Android, including Android 10, have a weakness dubbed StrandHogg that can lead to credential phishing and other malicious actions.
The federal government's technical standards body is working on best practices for verifying the security and integrity of hardware, a notoriously difficult problem.
Several Fortinet products had a hardcoded encryption key that could allow for passive monitoring of user traffic.
The sale and use of surveillance software is largely unregulated and unexamined, but Ron Deibert and his team at the Citizen Lab are working to change that through research into abuses.